Description
The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2655-1 | rails security update |
EUVD |
EUVD-2017-0289 | The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences. |
Github GHSA |
GHSA-q759-hwvc-m3jg | actionpack Cross-site Scripting vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T15:20:35.175Z
Reserved: 2013-02-19T00:00:00.000Z
Link: CVE-2013-1855
No data.
Status : Deferred
Published: 2013-03-19T22:55:01.027
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-1855
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Github GHSA